AlmaLinux alert ALSA-2025:23919 (httpd)
| From: | AlmaLinux Errata Notifications via Announce <announce@lists.almalinux.org> | |
| To: | announce@lists.almalinux.org | |
| Subject: | [Announce] [Security Advisory] ALSA-2025:23919: httpd security update (Important) | |
| Date: | Wed, 07 Jan 2026 15:05:20 +0000 | |
| Message-ID: | <0100019b98fdaf35-ae6856c1-098a-41b1-866a-20d384c6b7b0-000000@email.amazonses.com> | |
| Archive-link: | Article |
Hi, You are receiving an AlmaLinux Security update email because you subscribed to receive errata notifications from AlmaLinux. AlmaLinux: 9 Type: Security Severity: Important Release date: 2026-01-05 Summary: The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Apache HTTP Server: CGI environment variable override (CVE-2025-65082) * httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo (CVE-2025-66200) * httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=... (CVE-2025-58098) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Full details, updated packages, references, and other related information: https://errata.almalinux.org/9/ALSA-2025-23919.html This message is automatically generated, please don’t reply. For further questions, please, contact us via the AlmaLinux community chat: https://chat.almalinux.org/. Want to change your notification settings? Sign in and manage mailing lists on https://lists.almalinux.org. Kind regards, AlmaLinux Team _______________________________________________ Announce mailing list -- announce@lists.almalinux.org To unsubscribe send an email to announce-leave@lists.almalinux.org
